First time looking into this. The protocol doesn't seem to mention how the encryption is done ( ). Also let's assume all data is encrypted - you will still have visibility into which IP address the connection came from & the timing, right?

Replies (1)